On the Application of Biometric Techniques for Locating Damaged Artworks

Size: px
Start display at page:

Download "On the Application of Biometric Techniques for Locating Damaged Artworks"

Transcription

1 On the Application of Biometric Techniques for Locating Damaged Artworks Andreas Lanitis (1), Nicolas Tsapatsoulis (2), Anastasios Maronidis (1) (1) Visual Media Computing Lab, Dept. of Multimedia and Graphic Arts Cyprus University of Technology {andreas.lanitis, (2) Dept. of Communication and Internet Studies Cyprus University of Technology Keywords. Biometrics, Forensics, Looted Damaged Art, Icon Restoration, Icon Identification. Abstract. The continuously increasing art market activity and international art transactions lead the market for stolen and fraudulent art to extreme levels. According to US officials, art crime is the third-highest grossing criminal enterprise worldwide. As a result, art forensics is a rising research field dealing with the identification of stolen or looted art and their collection and repatriation. Photographs of artwork provide, in several cases, the only way to locate stolen and looted items. However, it is quite common these items to be damaged as a result of excavation and illegal movement. Digital processing of photographs of damaged artwork is, therefore of high importance in art forensics. This processing emphasizes on object restoration and although techniques from the field of image restoration can be applied it is of high importance to take into account the semantics of the artwork scene and especially the structure of objects appeared therein. In this paper, we assess the application of face image restoration techniques, applied on damaged faces appearing in Byzantine icons, in an attempt to identify the actual icons. Several biometric measurements and facial features along with a set of rules related to the design of Byzantine faces are utilized for this purpose. Preliminary investigation, applied on 25 icons, shows promising results. 1 Introduction Looted art has been a consequence of looting during war, natural disaster and riot for centuries. Looting of art, archaeology and other cultural property may be an opportunistic criminal act or may be a more organized case of unlawful or unethical pillage by the victor of a conflict [2]. As the demand for artifacts increases, criminal groups respond promptly with an unfailing supply of illegally obtained or excavated objects by plundering cultural sites, destroying their context and significance [5]. Renfrew [19] noted: the single largest source of destruction of the archaeological

2 heritage today is through looting the illicit, unrecorded and unpublished excavation to provide antiquities for commercial profit. According to FBI and UNESCO records, looting and trade of antiquities has grown into a multi-billion dollar industry and constitutes the third most profitable illegal traffic after narcotics and arms [5]. As a result, art forensics is a rising research field dealing with the identification of stolen or looted art and their collection and repatriation. Art crime lawyers, forensic experts, computer scientists, and other major players working on legal, forensic, governmental, and political join their efforts to address the enormity of this phenomenon. Insufficient standardized procedures, the lack of reliable data and the pressing need for improvement of methods employed in forensic practice, have been recognized by the National Academic of Sciences with the publication in 2009 of a scientific report stating: It is clear that change and advancements, both systematic and scientific, are needed in a number of forensic disciplines to ensure the reliability of work, establish enforceable standards, and promote best practices with consistent application [17]. This is also true in the case of looting and illicit trade of antiquities. As the origin of looted artifacts is primarily unknown, typological and stylistic studies do not always provide strong support in criminal justice cases for the artifacts attribution and repatriation. Scientific investigations of incidents involving stolen or looted art pose many technological difficulties. Methods providing proof beyond reasonable doubt are therefore required to help assign the precise location of origin / provenance through: chemical composition analyses; isotopic fingerprinting; or through other types of analysis that can identify diagnostic markers for an accurate attribution. This paper deals with a very early stage of art forensics, that of locating artwork which might be stolen or looted, with the aid of simple digital photographs. Since stolen or looted artwork is in many cases damaged (i.e., cutting a larger artwork into small pieces for easy carrying) digital processing of artwork photographs is necessary. This processing is in some cases similar to the classical image restoration. However, the aim here is to digitally restore the objects that appear in the artwork scene. Therefore, it is important to take into account the semantics of the artwork scene and especially the structure of objects appeared therein. In this paper, we assess the application of face image restoration techniques, applied on damaged faces appearing in Byzantine icons, in an attempt to identify the actual icons. Several biometric measurements and facial features along with a set of rules related to the design of Byzantine faces are utilized for this purpose. In the remainder of the paper we present a brief literature review followed by the description of the case study considered in this paper. In Section 4 we describe the experimental set up and present results. Conclusions and plans for future work are presented in Section 5. 2

3 2 Literature Review The art forensics is a new research field. Application of image processing techniques in this field is limited. However, there is a quite extensive literature concerning applications of digital image processing in cultural heritage. This paper borrows several ideas from these techniques and especially from the area of digital restoration of artwork. A variety of digital image processing techniques have been used in cultural heritage applications for guiding the actual restoration process (e.g. cleaning dirty paintings) or for providing virtual restoration. Morphological techniques and Radial Basis Function (RBF) Neural Networks (NN) have been utilized for crack detection, while order statistics and anisotropic diffusion have been used for crack filling in paintings [11, 20]. In a similar perspective, a methodology based on the Retinex theory of human vision for chromatic restoration of paintings has been proposed by Drago & Chiba [10]. Watermarking techniques have also been applied for protecting the digital reproduction of artworks as well as for simulating the actual restoration process [9]. A from local to whole approach methodology to remove cracks from old paintings and frescoes is presented in [3]. The Byzantine icon restoration methodology adopted in this paper combines established statistical methods for occlusion detection and texture restoration on human faces. For instance, in [24], the eyeglasses of a face are removed by learning the joint distribution between pairs of face images with and without eyeglasses from a database. Moreover, in [12, 18, 23] methods for facial occlusion based on recursive PCA reconstruction are described. The occluded regions are restored by iteratively processing the difference between the PCA-reconstructed and the original image. 3 Case Study 3.1 Byzantine Icons Byzantine art refers to the artistic style associated with Byzantine Empire. A large number of Byzantine icons and frescoes showing different Saints, dating back to the 15th century, can be found in churches and monasteries mainly in Eastern Europe. Like numerous other forms of artwork, a number of Byzantine icons of archeological value have been stolen and traded illegally [8]. Especially in the case of frescoes the process of extracting artworks from walls usually causes damages on the original artifacts. Similarly in the case of stolen icons the illegal transportation coupled with non-careful handling, often inflicts damages. 3.2 Byzantine Icon Restoration In [13, 16] an integrated methodology that can be used for detecting and restoring

4 damages on digitized Byzantine icons is described. The icon restoration method was influenced by the work of professional Byzantine icon conservators. It relies on the use of rules that describe the geometric and chromatic structure of faces appearing in Byzantine icons [22]. The restoration framework was also influenced by previous research efforts in the area of biometrics and in particular in the area of detecting and eliminating occlusions on human face images [12, 18, 24]. However, because faces in Byzantine icons are governed by unique geometrical and chromatic rules, face image processing algorithms were customized for dealing with the unique case of Byzantine style. The final application consists of several modules that include landmark annotation, shape restoration, damage detection and texture restoration. Given a damaged face appearing in a Byzantine icon, its shape, as this is defined by a set of 68 landmarks, is recovered through a 3D reconstruction process [4], using a Byzantine specific shape model that has been trained by imposing a set of Byzantine geometric rules on a generic human face model [13]. Detection of damaged areas on the shape-restored face involves the estimation of the residuals obtained after the coding and reconstruction of the face image regions using trained Principal Component Analysis (PCA) texture models. Extracted residuals can be used as the basis for obtaining information about the amount of damage and the positions of damaged regions [15]. The texture of damage-detected regions is, then, restored by utilizing the Recursive PCA algorithm. This is an iterative scheme based on data-driven statistical information [18]. Given a dataset consisting of non-damaged Byzantine faces, a texture model is trained. Changing the parameters of the model results in several synthetic face instances. In a partially damaged face image, the occluded regions are firstly located using the aforementioned automatic occlusion detection method and replaced by the corresponding regions of the nearest face, in terms of intensity distance, from the dataset. The resulting face is coded in model parameters and back reconstructed in the initial face space. Pixel residuals that correspond to the damaged areas between the initial and the reconstructed face are calculated. The above code-reconstruction process is repeated until the total residual is minimized. As a result of the restoration process, an overall 3D instance of the restored face is created. The final step of the restoration phase involves the projection of the 3D instance onto the original 2D face, so that the restored model instance overlaps with the damaged face, completing in that way the process of digital restoration. The developed algorithms have been incorporated within an integrated userfriendly software application that can be used for digital restoration of faces appearing in Byzantine icons. The application performs all of the above functionalities, i.e. damage detection, shape restoration and texture restoration. A quantitative experimental process proved the effectiveness of this Byzantine icon restoration framework [1]. 3.3 Identifying Damaged Stolen Icons Assuming that digital records of stolen Byzantine icons are available, we wish to have an automated system that indicates possible matches between a digital icon found in 4

5 different archives (i.e. internet sites) and the stored dataset of digital icons. Towards this end it is sufficient to use standard image similarity metrics that enable the identification of stolen artifacts. However, in the case that a stolen icon appears damaged, either as a result of normal condition degradation or as a result of human actions, the possible identification of such artwork may be inhibited. For example, Figures 1 and 2 show images of icons that were deliberately corrupted with damages and/or noise. The key question is whether it is still possible to obtain positive identifications between the distorted and original icons, despite the appearance transformations caused by damages and noise. Towards this end we propose to use the Byzantine icon restoration method described in section 3.2, in an attempt to minimize the effects of damages assisting in that way the positive identification of stolen icons. Figure 1 shows, also, examples of digitally restored images (right column), when the restoration method is applied to damaged images (Figure 1, center column). The question that arises concerns the possibility of improving the chances of locating stolen artwork based on the restored versions of the icons rather than utilizing damaged icons. 4 Experimental Evaluation A preliminary investigation that aims to assess the viability of using icon restoration for enhancing the chances of locating stolen icons is described in the following section. In our approach we only utilize data from the facial region because faces constitute a central part of Byzantine icons and as a result in digitized versions of (possibly stolen) icons the facial region is always shown, unlike other parts of an icon, such as labels, that may not be shown in order to impede the icon identification. 4.1 Experimental Set Up During the preliminary investigation 25 Byzantine icons were used. On each of the 25 icons, parts of the face were artificially damaged. For each face a set of 68 landmarks is located in order to enable the accurate derivation of facial features of the face shown in the image. Further to artificial damages imposed on the icons in the test set, noise, of three different types and increasing intensity, was also added. In particular the images were blurred using a Gaussian filter with standard deviations ranging from 0 to 50, salt and pepper noise covering 0% to 50% of the image and the correct positions of the landmarks were displaced by a random amount of 0 up to ±10 pixels. It should be noted that the displacement of the landmarks, although it does not affect the image itself, it affects the overall process of feature extraction. Furthermore in real applications it is expected to encounter non-accurate landmark localization, hence it is crucial to assess the effects of shape-displacement on the identification process. Examples of damaged and noise corrupted icons used in the experiments are shown in Figures 1 and 2. The feasibility of using restored icons was assessed through two main experiments.

6 Experiment 1: This experiment involves the comparison of the difference between image features derived from the original and damaged icons against the difference of image features between the original and restored icons. Experiment 2: In this experiment image features derived from either damaged or restored icons are used for identifying the actual icon against the original set of 25 icons used in the experiment. For the classification experiment a closest distance classifier was used because the primarily aim of this experiment was to assess the goodness of different features rather than the classifier itself. In addition the relatively small number of samples involved in this pilot study does not allow the training of more statistically rigorous classifiers. Fig. 1. Examples of original (left), artificially damaged (center) and restored icons (right) 4.2 Image Features For the two experiments described in section 4.1 six different types of features were used as the means of assessing the image similarity and/or identifying the damaged icon. The actual features used are: Shape Free Texture (SFT): The textures from the internal facial region are warped to a common shape and the intensities within the shape-normalized facial region are used as the feature vector. Active Shape Model (AAM) Parameters: The facial region is coded into a number of Active Appearance Model [6] parameters, using an AAM trained on 100 training Byzantine faces. AAM parameters describe in a compact way both the texture of a face and its facial shape as described by a set of 68 landmarks. Local Binary Patterns (LBP): The shape normalized internal facial region from an icon is divided into 33 patches and from each patch the LBP [1] is estimated. By concatenating the individual LBP vectors an overall feature vector is created. 6

7 Histogram of Oriented Gradients (MHOG): A bounding box of the facial area is divided in four windows (2x2) and a 36-dimension Histogram of Oriented Gradients [7] feature is computed in each window leading to a 144x1 vector representation (by concatenating the HOGs in the four windows). Local Histograms of Oriented Gradients (PHOG): Histogram of Oriented Gradients [7] derived at windows located on 68 key points of each face under consideration. These features highlight the local texture intensity fluctuations at the selected key points. Spatial Histogram of Key-points (SHIK): Based on an 8x8 fractal grid and SIFT [14] descriptors of 128 elements, each image is represented by a 64x128 element vector made of the concatenation of the accumulated SIFT descriptors ordered according to the order of fractal points so that the final descriptor does not depend on the number of SIFT key-points detected [21]. Fig. 2. Examples of noise corrupted icons. The top row shows blurred damaged icons (with sd=20), the middle row shows icons corrupted with 20% salt and pepper noise and the bottom row shows damaged icons with points displaced by ±6 pixels (red marks show the initial points and red marks the displaced points) 4.3 Experimental Results Experiment 1 (comparison of the difference between image features derived from the original and damaged icons): Figures 3, 4 and 5 show plots of the mean distance between feature vectors derived from damaged and original icons (blue lines) and the mean distance between feature vectors derived from restored and original icons (pink lines) among all samples in the test set, against the amount of noise added.

8 (a) (b) (c) (c) (d) (e) Fig. 3. From (a) to (f) mean distance for SFT, AAM, LBP, MHOG, PHOG and SHIK features when damaged icons are blurred with a Gaussian filter with sds ranging from 0 to 50. (a) (b) (c) (c) (d) (e) Fig. 4. From (a) to (f) mean distance for SFT, AAM, LBP, MHOG, PHOG and SHIK features when a percentage from 0-50 of damaged icons are corrupted with salt and pepper noise. (a) (b) (c) (c) (d) (e) Fig. 5. From (a) to (f) mean distance for SFT, AAM, LBP, MHOG, PHOG and SHIK features when landmarks on damaged images are displaced by 0-10 pixels. 8

9 In the case of the raw shape-free texture (SFT), AAM and SHIK features and despite the different types and amount of noise added on the damaged icons, the similarity between the restored faces and the original image remains always higher than in the case of the similarity between damaged and original icons. These findings indicate that the restoration process can play an important role in identifying damaged and/or noise corrupted icons. In general the performance of methods relying on local information (i.e. LPB, PHOG) is not as high as the introduction of noise effects distorts the local structure. Experiment 2 (icon identification based on a damaged or restored icon): Tables 1, 2 and 3 show the correct classification rates when features derived from damaged and restored icons, against the amount of noise added. According to the results, AAM features seem to be the most suitable for identifying damaged icons as in the case of using AAM-based features in most cases a 100% identification rate is achieved despite the corruption of the image with damages and noise. The only case that identification based on AAM s featured falls below 100% is the case involving increased shape displacement. Even in these cases classification based on the restored faces yields better results than classification based on the actual damaged icons. Although the classification performance of features relying on local structures (i.e. SHIK features) is worse than global features (i.e. AAM) under certain circumstances local features could be combined with global features in order to achieve improved overall performance. Table 1. Correct identification rates for ifferent features when damaged icons are blurred with a Gaussian filter with varying sds. SFT AAM LBP MHOG PHOG SHIK sd Damaged Restored Damaged Restored Damaged Restored Damaged Restored Damaged Restored Damaged Restored

10 Table 2. Correct identification rates for ifferent features when a percentage from 0-50 of damaged icons are corrupted with salt and pepper noise. SFT AAM LBP MHOG PHOG SHIK Noise level 0% 5% 10% 20% 30% 50% Damaged Restored Damaged Restored Damaged Restored Damaged Restored Damaged Restored Damaged Restored Table 3. Correct identification rates for ifferent features when landmarks on damaged images are displaced by 0-10 pixels SFT AAM LBP MHOG PHOG SHIK Displacement ±0 ±2 ±4 ±6 ±8 ±10 Damaged Restored Damaged Restored Damaged Restored Damaged Restored Damaged Restored Damaged Restored Conclusions A pilot study that aims to assess the feasibility of using digitally restored icons in an attempt to identify damaged icons with respect with a dataset of original icons. Within this context, damaged icons undergo a restoration process that aims to predict 10

11 the appearance of the missing parts, based on the appearance of the visible parts and a set of rules related to the design of Byzantine faces, incorporated in the restoration system. Preliminary results indicate that the use of the restored instead of the damaged icon, results in reduced differences in different feature spaces, enhancing in that way the chances of positive identifications of the icons involved. In the actual identification experiments for most features a noticeable improvement in identification performance is observed when utilizing digitally restored icons. Apart form few cases involving increased displacement of facial landmarks, AAM features achieve perfect identification performance using either damaged or restored faces. However, it is envisaged that the improved image similarity between a damaged icon and the original icon, observed when using AAM parameters extracted from a restored rather than a damaged icon will lead to improved identification performance when dealing with test sets containing large numbers of icons. IN the future we plan to stage extended experiments that will involve a large number of icons, in order to verify the early findings across a large number of test samples. In the future we also plan to investigate the use of other feature types and metrics that could potentially be used to offer enhanced identification performance between the restored icons and the original. We expect that our preliminary work and findings in this area will be expanded to cater for different types of artworks so that the efforts of preventing stealing, looting and trafficking of artworks are enhanced. 6 References [1] Ahonen, T., Hadid, A., & Pietikainen, M Face description with local binary patterns: Application to face recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(12), [2] Atwood, R Stealing History, Tomb Raiders, Smugglers and the Looting of the Ancient World. St. Martin s Griffin, New York. [3] Barni M., Bartolini F., Cappellini V Image processing for virtual restoration of artworks. IEEE Multimedia, 7, [4] Blanz V., Vetter T Face recognition based on fitting 3D morphable model. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, [5] Bowman B. A Transnational Crimes Against Culture: Looting at Archaeological Sites and the ''Grey'' Market in Antiquities. Journal of Contemporary Criminal Justice, 24(3), [6] Cootes T.F, Edwards G.J, Taylor C.J Active Appearance Models. IEEE Transactions on Pattern Analysis and Machine Intelligence, 23(6), [7] Dalal, N., Triggs, B Histograms of Oriented Gradients for Human Detection. Proc. of the 2005 IEEE Conference on Computer Vision and Pattern Recognition, pp [8] Hadjisavvas, S The Destruction of the Archaeological Heritage of Cyprus. Trade in Illicit Antiquities: The Destruction of the World's Archaeological Heritage,

12 [9] Del Mastio A., Cappellini V., Caldelli R., De Rosa A., Piva A Virtual restoration and protection of cultural heritage images. 15th International Conference on Digital signal Processing, pp [10] Drago F., Chiba N Locally adaptive chromatic restoration of digitally acquired paintings. International Journal of Image and Graphics, 5, [11] Giakoumis I., Nikolaidis N., Pitas I Digital image processing techniques for the detection and removal of cracks in digitized paintings. IEEE Transactions on Image Processing, 15, [12] Lanitis A Person Identification From Heavily Occluded Face Images. Procs. of the ACM Symposium of Applied Computing, vol 1, pp 5-9. [13] Lanitis A., Stylianou G., Voutounos C Virtual restoration of faces appearing in Byzantine icons. International Journal of Cultural Heritage, Elsevier. [14] Lowe D. G., Distinctive image features from scale invariant keypoints. International Journal of Computer Vision, vol. 60, no. 2, pp [15] Maronidis A. and Lanitis A An Automated Methodology for Assessing the Damage on Byzantine Icons. M. Ioannides et al. (Eds.): International Conference on Cultural Heritage EuroMed 2012, LNCS 7616, pp [16] Maronidis A., Voutounos C., Lanitis A An integrated tool for virtual restoration of Byzantine icons. Proceedings of the 4th International Conference on Information, Intelligence, Systems and Applications. [17] National Academy of Sciences Strengthening Forensic Science in the United States: A Path Forward. Doc. No , Washington, D.C. [18] Park J.S., Oh Y., Ahn S., Lee S.W Glasses removal from facial image using recursive PCA reconstruction. Lecture Notes in Computer Science (LNCS), 2688, [19] Renfrew, C Loot, legitimacy and ownership: the ethical crisis in archaeology. Duckworth, London. [20] Spagnolo G.S, Somma F Virtual restoration of cracks in digitized image of paintings. Journal of Physics Conference Series, 249 (1). [21] Theodosiou, Z. Tsapatsoulis, N. 2013, Spatial Histogram of Keypoints. Proc. of the 20th IEEE Intl. Conference on Image Processing, pp [22] Vranos I.C H Techniki tis Agiographias. P. S. Pournaras (In Greek), Thessaloniki. [23] Wang Z.M., Tao J.H Reconstruction of partially occluded face by fast recursive PCA. International conference on computational intelligence and security workshops, Harbin, December [24] Wu C., Liu C., Shum H.Y., Xy Y.Q., Zhang Z Automatic eyeglasses removal from face images, IEEE Transactions on Pattern Analysis and Machine Intelligence, 26,

Sketch Matching for Crime Investigation using LFDA Framework

Sketch Matching for Crime Investigation using LFDA Framework International Journal of Engineering and Technical Research (IJETR) Sketch Matching for Crime Investigation using LFDA Framework Anjali J. Pansare, Dr.V.C.Kotak, Babychen K. Mathew Abstract Here we are

More information

Image Extraction using Image Mining Technique

Image Extraction using Image Mining Technique IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 9 (September. 2013), V2 PP 36-42 Image Extraction using Image Mining Technique Prof. Samir Kumar Bandyopadhyay,

More information

International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: 2-4 July, 2015

International Journal of Modern Trends in Engineering and Research   e-issn No.: , Date: 2-4 July, 2015 International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 2-4 July, 2015 Illumination Invariant Face Recognition Sailee Salkar 1, Kailash Sharma 2, Nikhil

More information

Face Recognition Based Attendance System with Student Monitoring Using RFID Technology

Face Recognition Based Attendance System with Student Monitoring Using RFID Technology Face Recognition Based Attendance System with Student Monitoring Using RFID Technology Abhishek N1, Mamatha B R2, Ranjitha M3, Shilpa Bai B4 1,2,3,4 Dept of ECE, SJBIT, Bangalore, Karnataka, India Abstract:

More information

Wavelet-based Image Splicing Forgery Detection

Wavelet-based Image Splicing Forgery Detection Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of

More information

Multi-Resolution Estimation of Optical Flow on Vehicle Tracking under Unpredictable Environments

Multi-Resolution Estimation of Optical Flow on Vehicle Tracking under Unpredictable Environments , pp.32-36 http://dx.doi.org/10.14257/astl.2016.129.07 Multi-Resolution Estimation of Optical Flow on Vehicle Tracking under Unpredictable Environments Viet Dung Do 1 and Dong-Min Woo 1 1 Department of

More information

Improved SIFT Matching for Image Pairs with a Scale Difference

Improved SIFT Matching for Image Pairs with a Scale Difference Improved SIFT Matching for Image Pairs with a Scale Difference Y. Bastanlar, A. Temizel and Y. Yardımcı Informatics Institute, Middle East Technical University, Ankara, 06531, Turkey Published in IET Electronics,

More information

A Spatial Mean and Median Filter For Noise Removal in Digital Images

A Spatial Mean and Median Filter For Noise Removal in Digital Images A Spatial Mean and Median Filter For Noise Removal in Digital Images N.Rajesh Kumar 1, J.Uday Kumar 2 Associate Professor, Dept. of ECE, Jaya Prakash Narayan College of Engineering, Mahabubnagar, Telangana,

More information

Content Based Image Retrieval Using Color Histogram

Content Based Image Retrieval Using Color Histogram Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,

More information

A Comparison of Histogram and Template Matching for Face Verification

A Comparison of Histogram and Template Matching for Face Verification A Comparison of and Template Matching for Face Verification Chidambaram Chidambaram Universidade do Estado de Santa Catarina chidambaram@udesc.br Marlon Subtil Marçal, Leyza Baldo Dorini, Hugo Vieira Neto

More information

A NOVEL ARCHITECTURE FOR 3D MODEL IN VIRTUAL COMMUNITIES FROM DETECTED FACE

A NOVEL ARCHITECTURE FOR 3D MODEL IN VIRTUAL COMMUNITIES FROM DETECTED FACE A NOVEL ARCHITECTURE FOR 3D MODEL IN VIRTUAL COMMUNITIES FROM DETECTED FACE Vibekananda Dutta Dr.Nishtha Kesswani Deepti Gahalot Central University of Rajasthan Central University of Rajasthan Govt.Engineering

More information

Student Attendance Monitoring System Via Face Detection and Recognition System

Student Attendance Monitoring System Via Face Detection and Recognition System IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 11 May 2016 ISSN (online): 2349-784X Student Attendance Monitoring System Via Face Detection and Recognition System Pinal

More information

SCIENCE & TECHNOLOGY

SCIENCE & TECHNOLOGY Pertanika J. Sci. & Technol. 25 (S): 163-172 (2017) SCIENCE & TECHNOLOGY Journal homepage: http://www.pertanika.upm.edu.my/ Performance Comparison of Min-Max Normalisation on Frontal Face Detection Using

More information

Introduction to Video Forgery Detection: Part I

Introduction to Video Forgery Detection: Part I Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,

More information

Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence

Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence Sheng Yan LI, Jie FENG, Bin Gang XU, and Xiao Ming TAO Institute of Textiles and Clothing,

More information

Linear Gaussian Method to Detect Blurry Digital Images using SIFT

Linear Gaussian Method to Detect Blurry Digital Images using SIFT IJCAES ISSN: 2231-4946 Volume III, Special Issue, November 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on Emerging Research Areas in Computing(ERAC) www.caesjournals.org

More information

Multi-modal Human-computer Interaction

Multi-modal Human-computer Interaction Multi-modal Human-computer Interaction Attila Fazekas Attila.Fazekas@inf.unideb.hu SSIP 2008, 9 July 2008 Hungary and Debrecen Multi-modal Human-computer Interaction - 2 Debrecen Big Church Multi-modal

More information

Feature Extraction of Human Lip Prints

Feature Extraction of Human Lip Prints Journal of Current Computer Science and Technology Vol. 2 Issue 1 [2012] 01-08 Corresponding Author: Samir Kumar Bandyopadhyay, Department of Computer Science, Calcutta University, India. Email: skb1@vsnl.com

More information

Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition

Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition Hetal R. Thaker Atmiya Institute of Technology & science, Kalawad Road, Rajkot Gujarat, India C. K. Kumbharana,

More information

Toward an Augmented Reality System for Violin Learning Support

Toward an Augmented Reality System for Violin Learning Support Toward an Augmented Reality System for Violin Learning Support Hiroyuki Shiino, François de Sorbier, and Hideo Saito Graduate School of Science and Technology, Keio University, Yokohama, Japan {shiino,fdesorbi,saito}@hvrl.ics.keio.ac.jp

More information

Image Forgery Detection Using Svm Classifier

Image Forgery Detection Using Svm Classifier Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama

More information

Detection and Removal of Cracks in Digitized Paintings via Digital Image Processing

Detection and Removal of Cracks in Digitized Paintings via Digital Image Processing P P P P IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 9, November 2014. Detection and Removal of Cracks in Digitized Paintings via Digital Image Processing

More information

Demosaicing Algorithm for Color Filter Arrays Based on SVMs

Demosaicing Algorithm for Color Filter Arrays Based on SVMs www.ijcsi.org 212 Demosaicing Algorithm for Color Filter Arrays Based on SVMs Xiao-fen JIA, Bai-ting Zhao School of Electrical and Information Engineering, Anhui University of Science & Technology Huainan

More information

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION 1 Arun.A.V, 2 Bhatath.S, 3 Chethan.N, 4 Manmohan.C.M, 5 Hamsaveni M 1,2,3,4,5 Department of Computer Science and Engineering,

More information

Experiments with An Improved Iris Segmentation Algorithm

Experiments with An Improved Iris Segmentation Algorithm Experiments with An Improved Iris Segmentation Algorithm Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556, U.S.A.

More information

Chinese civilization has accumulated

Chinese civilization has accumulated Color Restoration and Image Retrieval for Dunhuang Fresco Preservation Xiangyang Li, Dongming Lu, and Yunhe Pan Zhejiang University, China Chinese civilization has accumulated many heritage sites over

More information

This paper is a postprint of a paper submitted to and accepted for publication in IET Biometrics and is subject to Institution of Engineering and

This paper is a postprint of a paper submitted to and accepted for publication in IET Biometrics and is subject to Institution of Engineering and This paper is a postprint of a paper submitted to and accepted for publication in IET Biometrics and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at

More information

THE MATERIAL DESCRIPTION AND CLASSIFICATION IN NEPHELE SYSTEM FOR ARTWORK RESTORATION

THE MATERIAL DESCRIPTION AND CLASSIFICATION IN NEPHELE SYSTEM FOR ARTWORK RESTORATION THE MATERIAL DESCRIPTION AND CLASSIFICATION IN NEPHELE SYSTEM FOR ARTWORK RESTORATION M. Beneš a,, B. Zitová b, J. Hradilová c, D. Hradil d a Dept. of Software Engineering, Faculty of Mathematics and Physics,

More information

Multi-modal Human-Computer Interaction. Attila Fazekas.

Multi-modal Human-Computer Interaction. Attila Fazekas. Multi-modal Human-Computer Interaction Attila Fazekas Attila.Fazekas@inf.unideb.hu Szeged, 12 July 2007 Hungary and Debrecen Multi-modal Human-Computer Interaction - 2 Debrecen Big Church Multi-modal Human-Computer

More information

Detection of License Plates of Vehicles

Detection of License Plates of Vehicles 13 W. K. I. L Wanniarachchi 1, D. U. J. Sonnadara 2 and M. K. Jayananda 2 1 Faculty of Science and Technology, Uva Wellassa University, Sri Lanka 2 Department of Physics, University of Colombo, Sri Lanka

More information

An Efficient Approach to Face Recognition Using a Modified Center-Symmetric Local Binary Pattern (MCS-LBP)

An Efficient Approach to Face Recognition Using a Modified Center-Symmetric Local Binary Pattern (MCS-LBP) , pp.13-22 http://dx.doi.org/10.14257/ijmue.2015.10.8.02 An Efficient Approach to Face Recognition Using a Modified Center-Symmetric Local Binary Pattern (MCS-LBP) Anusha Alapati 1 and Dae-Seong Kang 1

More information

Automatic Crack Detection and Inpainting

Automatic Crack Detection and Inpainting Automatic Crack Detection and Inpainting Khyati T. Vaghela Computer Engineering Department B.V.M. Engineering College, V.V.Nagar, Gujarat (India) khyati1583@gmail.com Narendra M. Patel Computer Engineering

More information

LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System

LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System Muralindran Mariappan, Manimehala Nadarajan, and Karthigayan Muthukaruppan Abstract Face identification and tracking has taken a

More information

Research on Hand Gesture Recognition Using Convolutional Neural Network

Research on Hand Gesture Recognition Using Convolutional Neural Network Research on Hand Gesture Recognition Using Convolutional Neural Network Tian Zhaoyang a, Cheng Lee Lung b a Department of Electronic Engineering, City University of Hong Kong, Hong Kong, China E-mail address:

More information

Université Laval Face Motion and Time-Lapse Video Database (UL-FMTV)

Université Laval Face Motion and Time-Lapse Video Database (UL-FMTV) 14 th Quantitative InfraRed Thermography Conference Université Laval Face Motion and Time-Lapse Video Database (UL-FMTV) by Reza Shoja Ghiass*, Hakim Bendada*, Xavier Maldague* *Computer Vision and Systems

More information

Locating the Query Block in a Source Document Image

Locating the Query Block in a Source Document Image Locating the Query Block in a Source Document Image Naveena M and G Hemanth Kumar Department of Studies in Computer Science, University of Mysore, Manasagangotri-570006, Mysore, INDIA. Abstract: - In automatic

More information

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication

More information

VARIOUS METHODS IN DIGITAL IMAGE PROCESSING. S.Selvaragini 1, E.Venkatesan 2. BIST, BIHER,Bharath University, Chennai-73

VARIOUS METHODS IN DIGITAL IMAGE PROCESSING. S.Selvaragini 1, E.Venkatesan 2. BIST, BIHER,Bharath University, Chennai-73 Volume 116 No. 16 2017, 265-269 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu VARIOUS METHODS IN DIGITAL IMAGE PROCESSING S.Selvaragini 1, E.Venkatesan

More information

Combined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper

Combined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 9 (September 2014), PP.57-68 Combined Approach for Face Detection, Eye

More information

Background. Computer Vision & Digital Image Processing. Improved Bartlane transmitted image. Example Bartlane transmitted image

Background. Computer Vision & Digital Image Processing. Improved Bartlane transmitted image. Example Bartlane transmitted image Background Computer Vision & Digital Image Processing Introduction to Digital Image Processing Interest comes from two primary backgrounds Improvement of pictorial information for human perception How

More information

Stamp detection in scanned documents

Stamp detection in scanned documents Annales UMCS Informatica AI X, 1 (2010) 61-68 DOI: 10.2478/v10065-010-0036-6 Stamp detection in scanned documents Paweł Forczmański Chair of Multimedia Systems, West Pomeranian University of Technology,

More information

Blind Single-Image Super Resolution Reconstruction with Defocus Blur

Blind Single-Image Super Resolution Reconstruction with Defocus Blur Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Blind Single-Image Super Resolution Reconstruction with Defocus Blur Fengqing Qin, Lihong Zhu, Lilan Cao, Wanan Yang Institute

More information

Image Denoising Using Statistical and Non Statistical Method

Image Denoising Using Statistical and Non Statistical Method Image Denoising Using Statistical and Non Statistical Method Ms. Shefali A. Uplenchwar 1, Mrs. P. J. Suryawanshi 2, Ms. S. G. Mungale 3 1MTech, Dept. of Electronics Engineering, PCE, Maharashtra, India

More information

Tampering and Copy-Move Forgery Detection Using Sift Feature

Tampering and Copy-Move Forgery Detection Using Sift Feature Tampering and Copy-Move Forgery Detection Using Sift Feature N.Anantharaj 1 M-TECH (IT) Final Year, Department of IT, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu, India 1 ABSTRACT:

More information

APPENDIX 1 TEXTURE IMAGE DATABASES

APPENDIX 1 TEXTURE IMAGE DATABASES 167 APPENDIX 1 TEXTURE IMAGE DATABASES A 1.1 BRODATZ DATABASE The Brodatz's photo album is a well-known benchmark database for evaluating texture recognition algorithms. It contains 111 different texture

More information

Evolutionary Learning of Local Descriptor Operators for Object Recognition

Evolutionary Learning of Local Descriptor Operators for Object Recognition Genetic and Evolutionary Computation Conference Montréal, Canada 6th ANNUAL HUMIES AWARDS Evolutionary Learning of Local Descriptor Operators for Object Recognition Present : Cynthia B. Pérez and Gustavo

More information

Multiresolution Analysis of Connectivity

Multiresolution Analysis of Connectivity Multiresolution Analysis of Connectivity Atul Sajjanhar 1, Guojun Lu 2, Dengsheng Zhang 2, Tian Qi 3 1 School of Information Technology Deakin University 221 Burwood Highway Burwood, VIC 3125 Australia

More information

Restoration of Motion Blurred Document Images

Restoration of Motion Blurred Document Images Restoration of Motion Blurred Document Images Bolan Su 12, Shijian Lu 2 and Tan Chew Lim 1 1 Department of Computer Science,School of Computing,National University of Singapore Computing 1, 13 Computing

More information

Reliable Classification of Partially Occluded Coins

Reliable Classification of Partially Occluded Coins Reliable Classification of Partially Occluded Coins e-mail: L.J.P. van der Maaten P.J. Boon MICC, Universiteit Maastricht P.O. Box 616, 6200 MD Maastricht, The Netherlands telephone: (+31)43-3883901 fax:

More information

Study Impact of Architectural Style and Partial View on Landmark Recognition

Study Impact of Architectural Style and Partial View on Landmark Recognition Study Impact of Architectural Style and Partial View on Landmark Recognition Ying Chen smileyc@stanford.edu 1. Introduction Landmark recognition in image processing is one of the important object recognition

More information

Multimodal Face Recognition using Hybrid Correlation Filters

Multimodal Face Recognition using Hybrid Correlation Filters Multimodal Face Recognition using Hybrid Correlation Filters Anamika Dubey, Abhishek Sharma Electrical Engineering Department, Indian Institute of Technology Roorkee, India {ana.iitr, abhisharayiya}@gmail.com

More information

Automatic Morphological Segmentation and Region Growing Method of Diagnosing Medical Images

Automatic Morphological Segmentation and Region Growing Method of Diagnosing Medical Images International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 3 (2012), pp. 173-180 International Research Publications House http://www. irphouse.com Automatic Morphological

More information

License Plate Localisation based on Morphological Operations

License Plate Localisation based on Morphological Operations License Plate Localisation based on Morphological Operations Xiaojun Zhai, Faycal Benssali and Soodamani Ramalingam School of Engineering & Technology University of Hertfordshire, UH Hatfield, UK Abstract

More information

Multimedia Forensics

Multimedia Forensics Multimedia Forensics Using Mathematics and Machine Learning to Determine an Image's Source and Authenticity Matthew C. Stamm Multimedia & Information Security Lab (MISL) Department of Electrical and Computer

More information

EFFECTS OF SEVERE SIGNAL DEGRADATION ON EAR DETECTION. J. Wagner, A. Pflug, C. Rathgeb and C. Busch

EFFECTS OF SEVERE SIGNAL DEGRADATION ON EAR DETECTION. J. Wagner, A. Pflug, C. Rathgeb and C. Busch EFFECTS OF SEVERE SIGNAL DEGRADATION ON EAR DETECTION J. Wagner, A. Pflug, C. Rathgeb and C. Busch da/sec Biometrics and Internet Security Research Group Hochschule Darmstadt, Darmstadt, Germany {johannes.wagner,anika.pflug,christian.rathgeb,christoph.busch}@cased.de

More information

An Adaptive Kernel-Growing Median Filter for High Noise Images. Jacob Laurel. Birmingham, AL, USA. Birmingham, AL, USA

An Adaptive Kernel-Growing Median Filter for High Noise Images. Jacob Laurel. Birmingham, AL, USA. Birmingham, AL, USA An Adaptive Kernel-Growing Median Filter for High Noise Images Jacob Laurel Department of Electrical and Computer Engineering, University of Alabama at Birmingham, Birmingham, AL, USA Electrical and Computer

More information

Differentiation of Malignant and Benign Masses on Mammograms Using Radial Local Ternary Pattern

Differentiation of Malignant and Benign Masses on Mammograms Using Radial Local Ternary Pattern Differentiation of Malignant and Benign Masses on Mammograms Using Radial Local Ternary Pattern Chisako Muramatsu 1, Min Zhang 1, Takeshi Hara 1, Tokiko Endo 2,3, and Hiroshi Fujita 1 1 Department of Intelligent

More information

A New Scheme for No Reference Image Quality Assessment

A New Scheme for No Reference Image Quality Assessment Author manuscript, published in "3rd International Conference on Image Processing Theory, Tools and Applications, Istanbul : Turkey (2012)" A New Scheme for No Reference Image Quality Assessment Aladine

More information

Iris Segmentation & Recognition in Unconstrained Environment

Iris Segmentation & Recognition in Unconstrained Environment www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT

More information

Color Constancy Using Standard Deviation of Color Channels

Color Constancy Using Standard Deviation of Color Channels 2010 International Conference on Pattern Recognition Color Constancy Using Standard Deviation of Color Channels Anustup Choudhury and Gérard Medioni Department of Computer Science University of Southern

More information

Laser Printer Source Forensics for Arbitrary Chinese Characters

Laser Printer Source Forensics for Arbitrary Chinese Characters Laser Printer Source Forensics for Arbitrary Chinese Characters Xiangwei Kong, Xin gang You,, Bo Wang, Shize Shang and Linjie Shen Information Security Research Center, Dalian University of Technology,

More information

DYNAMIC CONVOLUTIONAL NEURAL NETWORK FOR IMAGE SUPER- RESOLUTION

DYNAMIC CONVOLUTIONAL NEURAL NETWORK FOR IMAGE SUPER- RESOLUTION Journal of Advanced College of Engineering and Management, Vol. 3, 2017 DYNAMIC CONVOLUTIONAL NEURAL NETWORK FOR IMAGE SUPER- RESOLUTION Anil Bhujel 1, Dibakar Raj Pant 2 1 Ministry of Information and

More information

Effects of the Unscented Kalman Filter Process for High Performance Face Detector

Effects of the Unscented Kalman Filter Process for High Performance Face Detector Effects of the Unscented Kalman Filter Process for High Performance Face Detector Bikash Lamsal and Naofumi Matsumoto Abstract This paper concerns with a high performance algorithm for human face detection

More information

Urban Feature Classification Technique from RGB Data using Sequential Methods

Urban Feature Classification Technique from RGB Data using Sequential Methods Urban Feature Classification Technique from RGB Data using Sequential Methods Hassan Elhifnawy Civil Engineering Department Military Technical College Cairo, Egypt Abstract- This research produces a fully

More information

Image Manipulation Detection using Convolutional Neural Network

Image Manipulation Detection using Convolutional Neural Network Image Manipulation Detection using Convolutional Neural Network Dong-Hyun Kim 1 and Hae-Yeoun Lee 2,* 1 Graduate Student, 2 PhD, Professor 1,2 Department of Computer Software Engineering, Kumoh National

More information

COMP 776 Computer Vision Project Final Report Distinguishing cartoon image and paintings from photographs

COMP 776 Computer Vision Project Final Report Distinguishing cartoon image and paintings from photographs COMP 776 Computer Vision Project Final Report Distinguishing cartoon image and paintings from photographs Sang Woo Lee 1. Introduction With overwhelming large scale images on the web, we need to classify

More information

Digital Image Processing

Digital Image Processing Digital Image Processing 1 Patrick Olomoshola, 2 Taiwo Samuel Afolayan 1,2 Surveying & Geoinformatic Department, Faculty of Environmental Sciences, Rufus Giwa Polytechnic, Owo. Nigeria Abstract: This paper

More information

A Histogram based Algorithm for Denoising Images Corrupted with Impulse Noise

A Histogram based Algorithm for Denoising Images Corrupted with Impulse Noise A Histogram based Algorithm for Denoising Images Corrupted with Impulse Noise Jasmeen Kaur Lecturer RBIENT, Hoshiarpur Abstract An algorithm is designed for the histogram representation of an image, subsequent

More information

THERMAL DETECTION OF WATER SATURATION SPOTS FOR LANDSLIDE PREDICTION

THERMAL DETECTION OF WATER SATURATION SPOTS FOR LANDSLIDE PREDICTION THERMAL DETECTION OF WATER SATURATION SPOTS FOR LANDSLIDE PREDICTION Aufa Zin, Kamarul Hawari and Norliana Khamisan Faculty of Electrical and Electronics Engineering, Universiti Malaysia Pahang, Pekan,

More information

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Hieu Cuong Nguyen and Stefan Katzenbeisser Computer Science Department, Darmstadt University of Technology, Germany {cuong,katzenbeisser}@seceng.informatik.tu-darmstadt.de

More information

PHOTOGRAPH RETRIEVAL BASED ON FACE SKETCH USING SIFT WITH PCA

PHOTOGRAPH RETRIEVAL BASED ON FACE SKETCH USING SIFT WITH PCA ABSTRACT PHOTOGRAPH RETRIEVAL BASED ON FACE SKETCH USING SIFT WITH PCA Tayyaba Hashmi ME Information Technology, Shah & Anchor Kutchhi Engineering College University of Mumbai, (India) The problem of matching

More information

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition

More information

CS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee

CS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee CS 365 Project Report Digital Image Forensics Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee 1 Abstract Determining the authenticity of an image is now an important area

More information

An Efficient Noise Removing Technique Using Mdbut Filter in Images

An Efficient Noise Removing Technique Using Mdbut Filter in Images IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. II (May - Jun.2015), PP 49-56 www.iosrjournals.org An Efficient Noise

More information

A Proposal for Security Oversight at Automated Teller Machine System

A Proposal for Security Oversight at Automated Teller Machine System International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 6 (June 2014), PP.18-25 A Proposal for Security Oversight at Automated

More information

Non-Uniform Motion Blur For Face Recognition

Non-Uniform Motion Blur For Face Recognition IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 08, Issue 6 (June. 2018), V (IV) PP 46-52 www.iosrjen.org Non-Uniform Motion Blur For Face Recognition Durga Bhavani

More information

OBJECTIVE OF THE BOOK ORGANIZATION OF THE BOOK

OBJECTIVE OF THE BOOK ORGANIZATION OF THE BOOK xv Preface Advancement in technology leads to wide spread use of mounting cameras to capture video imagery. Such surveillance cameras are predominant in commercial institutions through recording the cameras

More information

Removal of High Density Salt and Pepper Noise through Modified Decision based Un Symmetric Trimmed Median Filter

Removal of High Density Salt and Pepper Noise through Modified Decision based Un Symmetric Trimmed Median Filter Removal of High Density Salt and Pepper Noise through Modified Decision based Un Symmetric Trimmed Median Filter K. Santhosh Kumar 1, M. Gopi 2 1 M. Tech Student CVSR College of Engineering, Hyderabad,

More information

Checkerboard Tracker for Camera Calibration. Andrew DeKelaita EE368

Checkerboard Tracker for Camera Calibration. Andrew DeKelaita EE368 Checkerboard Tracker for Camera Calibration Abstract Andrew DeKelaita EE368 The checkerboard extraction process is an important pre-preprocessing step in camera calibration. This project attempts to implement

More information

An Automatic System for Detecting the Vehicle Registration Plate from Video in Foggy and Rainy Environments using Restoration Technique

An Automatic System for Detecting the Vehicle Registration Plate from Video in Foggy and Rainy Environments using Restoration Technique An Automatic System for Detecting the Vehicle Registration Plate from Video in Foggy and Rainy Environments using Restoration Technique Savneet Kaur M.tech (CSE) GNDEC LUDHIANA Kamaljit Kaur Dhillon Assistant

More information

Midterm Examination CS 534: Computational Photography

Midterm Examination CS 534: Computational Photography Midterm Examination CS 534: Computational Photography November 3, 2015 NAME: SOLUTIONS Problem Score Max Score 1 8 2 8 3 9 4 4 5 3 6 4 7 6 8 13 9 7 10 4 11 7 12 10 13 9 14 8 Total 100 1 1. [8] What are

More information

Fast identification of individuals based on iris characteristics for biometric systems

Fast identification of individuals based on iris characteristics for biometric systems Fast identification of individuals based on iris characteristics for biometric systems J.G. Rogeri, M.A. Pontes, A.S. Pereira and N. Marranghello Department of Computer Science and Statistic, IBILCE, Sao

More information

Bogdan Smolka. Polish-Japanese Institute of Information Technology Koszykowa 86, , Warsaw

Bogdan Smolka. Polish-Japanese Institute of Information Technology Koszykowa 86, , Warsaw appeared in 10. Workshop Farbbildverarbeitung 2004, Koblenz, Online-Proceedings http://www.uni-koblenz.de/icv/fws2004/ Robust Color Image Retrieval for the WWW Bogdan Smolka Polish-Japanese Institute of

More information

Camera Resolution and Distortion: Advanced Edge Fitting

Camera Resolution and Distortion: Advanced Edge Fitting 28, Society for Imaging Science and Technology Camera Resolution and Distortion: Advanced Edge Fitting Peter D. Burns; Burns Digital Imaging and Don Williams; Image Science Associates Abstract A frequently

More information

FACE RECOGNITION USING NEURAL NETWORKS

FACE RECOGNITION USING NEURAL NETWORKS Int. J. Elec&Electr.Eng&Telecoms. 2014 Vinoda Yaragatti and Bhaskar B, 2014 Research Paper ISSN 2319 2518 www.ijeetc.com Vol. 3, No. 3, July 2014 2014 IJEETC. All Rights Reserved FACE RECOGNITION USING

More information

On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor

On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor Mohamed. K. Shahin *, Ahmed. M. Badawi **, and Mohamed. S. Kamel ** *B.Sc. Design Engineer at International

More information

Image Processing for feature extraction

Image Processing for feature extraction Image Processing for feature extraction 1 Outline Rationale for image pre-processing Gray-scale transformations Geometric transformations Local preprocessing Reading: Sonka et al 5.1, 5.2, 5.3 2 Image

More information

A VIDEO CAMERA ROAD SIGN SYSTEM OF THE EARLY WARNING FROM COLLISION WITH THE WILD ANIMALS

A VIDEO CAMERA ROAD SIGN SYSTEM OF THE EARLY WARNING FROM COLLISION WITH THE WILD ANIMALS Vol. 12, Issue 1/2016, 42-46 DOI: 10.1515/cee-2016-0006 A VIDEO CAMERA ROAD SIGN SYSTEM OF THE EARLY WARNING FROM COLLISION WITH THE WILD ANIMALS Slavomir MATUSKA 1*, Robert HUDEC 2, Patrik KAMENCAY 3,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK CLEANING AND SEGMENTATION OF WEB IMAGES USING DENOISING TECHNIQUES VAISHALI S.

More information

Classification in Image processing: A Survey

Classification in Image processing: A Survey Classification in Image processing: A Survey Rashmi R V, Sheela Sridhar Department of computer science and Engineering, B.N.M.I.T, Bangalore-560070 Department of computer science and Engineering, B.N.M.I.T,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 4, April 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Novel Approach

More information

Performance Evaluation of Edge Detection Techniques for Square Pixel and Hexagon Pixel images

Performance Evaluation of Edge Detection Techniques for Square Pixel and Hexagon Pixel images Performance Evaluation of Edge Detection Techniques for Square Pixel and Hexagon Pixel images Keshav Thakur 1, Er Pooja Gupta 2,Dr.Kuldip Pahwa 3, 1,M.Tech Final Year Student, Deptt. of ECE, MMU Ambala,

More information

CROSS-LAYER FEATURES IN CONVOLUTIONAL NEURAL NETWORKS FOR GENERIC CLASSIFICATION TASKS. Kuan-Chuan Peng and Tsuhan Chen

CROSS-LAYER FEATURES IN CONVOLUTIONAL NEURAL NETWORKS FOR GENERIC CLASSIFICATION TASKS. Kuan-Chuan Peng and Tsuhan Chen CROSS-LAYER FEATURES IN CONVOLUTIONAL NEURAL NETWORKS FOR GENERIC CLASSIFICATION TASKS Kuan-Chuan Peng and Tsuhan Chen Cornell University School of Electrical and Computer Engineering Ithaca, NY 14850

More information

Real Time Word to Picture Translation for Chinese Restaurant Menus

Real Time Word to Picture Translation for Chinese Restaurant Menus Real Time Word to Picture Translation for Chinese Restaurant Menus Michelle Jin, Ling Xiao Wang, Boyang Zhang Email: mzjin12, lx2wang, boyangz @stanford.edu EE268 Project Report, Spring 2014 Abstract--We

More information

ANALYSIS OF PARTIAL IRIS RECOGNITION

ANALYSIS OF PARTIAL IRIS RECOGNITION ANALYSIS OF PARTIAL IRIS RECOGNITION Yingzi Du, Robert Ives, Bradford Bonney, Delores Etter Electrical Engineering Department, U.S. Naval Academy, Annapolis, MD, USA 21402 ABSTRACT In this paper, we investigate

More information

Video Synthesis System for Monitoring Closed Sections 1

Video Synthesis System for Monitoring Closed Sections 1 Video Synthesis System for Monitoring Closed Sections 1 Taehyeong Kim *, 2 Bum-Jin Park 1 Senior Researcher, Korea Institute of Construction Technology, Korea 2 Senior Researcher, Korea Institute of Construction

More information

Face Detection System on Ada boost Algorithm Using Haar Classifiers

Face Detection System on Ada boost Algorithm Using Haar Classifiers Vol.2, Issue.6, Nov-Dec. 2012 pp-3996-4000 ISSN: 2249-6645 Face Detection System on Ada boost Algorithm Using Haar Classifiers M. Gopi Krishna, A. Srinivasulu, Prof (Dr.) T.K.Basak 1, 2 Department of Electronics

More information

Segmentation of Microscopic Bone Images

Segmentation of Microscopic Bone Images International Journal of Electronics Engineering, 2(1), 2010, pp. 11-15 Segmentation of Microscopic Bone Images Anand Jatti Research Scholar, Vishveshvaraiah Technological University, Belgaum, Karnataka

More information

Face Recognition System Based on Infrared Image

Face Recognition System Based on Infrared Image International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 6, Issue 1 [October. 217] PP: 47-56 Face Recognition System Based on Infrared Image Yong Tang School of Electronics

More information

Lossless Huffman coding image compression implementation in spatial domain by using advanced enhancement techniques

Lossless Huffman coding image compression implementation in spatial domain by using advanced enhancement techniques Lossless Huffman coding image compression implementation in spatial domain by using advanced enhancement techniques Ali Tariq Bhatti 1, Dr. Jung H. Kim 2 1,2 Department of Electrical & Computer engineering

More information